risk management

Results 1 - 25 of 749Sort Results By: Published Date | Title | Company Name
Published By: Fortinet     Published Date: Jul 02, 2020
"Segmentation of networks, devices, users, and applications has long been a best practice for supplementing edge security and breaking up flat internal networks. However, for network engineering and operations leaders who prioritize risk mitigation, achieving compliance and effective security posture management, current segmentation approaches fall short. Read more. As multi-cloud, mobile-first, Internet-of-Things (IoT), and other digital transformation initiatives bloat attack surfaces, Internal Segmentation offers a vital new approach. It addresses segmentation’s current shortcomings and is applicable to a wide range of access-control scenarios."
Tags : 
    
Fortinet
Published By: Spirion     Published Date: Feb 26, 2020
In today’s world, data breaches are an increasingly common occurrence. The greatest financial damage typically comes when breaches expose sensitive data, such as social security numbers, credit card data, health information, business secrets, government records, and other valuable data that is costly to lose, especially when a breach captures the media’s attention. Once public, such breaches result in tens or hundreds of millions of dollars in post?breach losses. In this book, you’ll discover how to identify sensitive data, implement a data classification process, and minimize the risk of data breaches. You’ll also learn about the risks of not classifying data and the components of a data classification and sensitive data management life cycle. This book will arm you with the tools for managing risks and preventing the next financially damaging breach of sensitive data.
Tags : 
    
Spirion
Published By: Coupa     Published Date: Dec 14, 2018
Financial services firms are turning to Business Spend Management (BSM) as a Strategic Solution Beset by competitors and burdened by ever-shifting regulatory requirements, financial services firms are turning to cloud-based technology to gain better control over—and visibility into—spending. In the process, they are becoming fiercer competitors. Download this ebook for insights into how you can improve your organization's financial health and how: A cloud complete-BSM solution can track and measure all purchasing activities, identifying patterns that provide opportunities for negotiating discounts, and better managing risk To increase savings across source-to-contract, procure-to-pay, travel & expense management, as well as risk and supplier management Modern technology enables the finance function to take cost-management to a deeper level—without investing in IT infrastructure
Tags : 
    
Coupa
Published By: Commvault     Published Date: Jul 06, 2016
Around-the-clock global operations, data growth, and server virtualization all together can complicate protection and recovery strategies. They affect when and how often you can perform backups, increase the time required to back up, and ultimately affect your ability to successfully restore. These challenges can force lower standards for recovery objectives, such as reducing the frequency of backup jobs or protecting fewer applications, both of which can introduce risk. High-speed snapshot technologies and application integration can go a long way toward meeting these needs, and they have quickly become essential elements of a complete protection strategy. But snapshot copies have often been managed separately from traditional backup processes. Features like cataloging for search and retrieval as well as tape creation usually require separate management and do not fully leverage snapshot capabilities. To eliminate complexity and accelerate protection and recovery, you need a solution
Tags : 
commvault, intellisnap, netapp, backup, recovery, data growth, server virtualization, data protection
    
Commvault
Published By: Commvault     Published Date: Jul 06, 2016
Email is the backbone of today’s corporate business processes. It lives as the primary communication vehicle internally between employees and externally with customers, vendors, partners and investors. It is arguably today’s most pervasive and critical business application within which is stored the most valuable business content. To protect this vital information while working to eliminate risk, lower management costs and improve business insight, companies require a comprehensive email archiving solution. This solution should not only work to effectively retain email information in a searchable repository, the best email archiving solutions also provide a smarter approach to collecting, retaining and accessing data so that it can deliver true business value.
Tags : 
commvault, email archiving, data protection, email archiving solution, mailbox archiving, reduce bloat, o365, it management
    
Commvault
Published By: Dell Security     Published Date: Mar 29, 2016
With Dell™ One Identity Privileged Password Manager and Privileged Session Manager from Dell Software, managing privileged passwords is easy and far more secure. This white paper explains how.
Tags : 
risk management, privileged accounts, priviliged passwords, civilian agencies, dell, dell privileged session manager, dell security
    
Dell Security
Published By: Dell Security     Published Date: Mar 29, 2016
With Dell One Identity Privileged Password Manager and Privileged Session Manager, managing privileged passwords is easy and far more secure. This white paper explains how.
Tags : 
risk management, dell, dell privileged session manager, privileged passwords, two-factor authentication
    
Dell Security
Published By: TriNet     Published Date: Jun 13, 2011
Learn how a PEO can help remove business risks, contain HR costs, and enable you to focus on growing your business.
Tags : 
trinet, entrepreneur, peo, professional employer organization, smb, human resources, co-employment, talent market
    
TriNet
Published By: SAP     Published Date: May 03, 2016
Managing risk has never been so important for businesses, nor has it been so difficult. New globalresearch commissioned by SAP has revealed that an increasingly complex business and risk environment is severely challenging companies.
Tags : 
sap, risk, management, complexity, business, enterprise applications, data management, business technology
    
SAP
Published By: Oracle     Published Date: Jun 20, 2016
Research conducted by The Economist Intelligence Unit (EIU), sponsored by Oracle, provides answers. The results show that a proactive security strategy backed by a fully engaged C-suite and board of directors reduced the growth of cyber-attacks and breaches by 53% over comparable firms. These findings were compiled from responses by 300 firms, across multiple industries, against a range of attack modes and over a two-year period from February 2014 to January 2016. The lessons are clear. As cyber-attackers elevate their game, the response must be an enterprise solution. Only C-suites and boards of directors marshal the authority and resources to support a truly enterprise-wide approach. In sum, proactive cyber-security strategies, supported by senior management, can cut vulnerability to cyber-attack in half.
Tags : 
security, c-suite, data, cyber risk, enterprise, management, economist, intelligence unit
    
Oracle
Published By: SAP     Published Date: Nov 16, 2017
Explore how SAP HANA Enterprise Cloud empowers business and IT operations to unlock the full value of the SAP HANA platform in the cloud. See how our end-to-end, privately managed cloud solution delivers a comprehensive, coordinated application landscape and suite of managed services.
Tags : 
    
SAP
Published By: FICO     Published Date: May 11, 2017
Agencies have long provided telecommunications companies with scalability for collections in a high-growth industry. Today, with markets and business models changing, your collections agencies have a growing impact — for good or ill — on your success.
Tags : 
customer experience, analytics, risk management
    
FICO
Published By: Symantec     Published Date: Aug 15, 2017
Stay ahead of the evolving threats. Organized crime is driving the rapid growth and sophisticated evolution of advanced threats that put entire website ecosystems at risk, and no organization is safe. The stealthy nature of these threats gives cybercriminals the time to go deeper into website environments, very often with severe consequences. The longer the time before detection and resolution, the more damage is inflicted. The risk and size of fines, lawsuits, reparation costs, damaged reputation, loss of operations, loss of sales, and loss of customers pile up higher and higher. The complexity of website security management and lack of visibility across website ecosystems is further impacted by the fact that it is nearly impossible to know how and where to allocate resources. Website security must be evolved in line with these growing threats and challenges.
Tags : 
    
Symantec
Published By: Oracle CX     Published Date: Oct 20, 2017
This whitepaper explores the new SPARC S7 server features and then compares this offering to a similar x86 offering. The key characteristics of the SPARC S7 to be highlighted are: ? Designed for scale-out and cloud infrastructures ? SPARC S7 processor with greater core performance than the latest Intel Xeon E5 processor ? Software in Silicon which offers hardware-based features such as data acceleration and security The SPARC S7 is then compared to a similar x86 solution from three different perspectives, namely performance, risk and cost. Performance matters as business markets are driving IT to provide an environment that: ? Continuously provides real-time results. ? Processes more complex workload stacks. ? Optimizes usage of per-core software licenses. Risk matters today and into the foreseeable future, as challenges to secure systems and data are becoming more frequent and invasive from within and from outside. Oracle SPARC systems approach risk management from multiple perspectiv
Tags : 
    
Oracle CX
Published By: Dome9     Published Date: Apr 25, 2018
As of May 2017, according to a report from The Depository Trust & Clearing Corporation (DTCC), which provides financial transaction and data processing services for the global financial industry, cloud computing has reached a tipping point1. Today, financial services companies can benefit from the capabilities and cost efficiencies of the cloud. In October of 2016, the Federal Deposit Insurance Corporation (FDIC), the Office of the Comptroller of Currency (OCC) and the Federal Reserve Board (FRB) jointly announced enhanced cyber risk management standards for financial institutions in an Advanced Notice of Proposed Rulemaking (ANPR)2. These proposed standards for enhanced cybersecurity are aimed at protecting the entire financial system, not just the institution. To meet these new standards, financial institutions will require the right cloud-based network security platform for comprehensive security management, verifiable compliance and governance and active protection of customer data
Tags : 
    
Dome9
Published By: KPMG     Published Date: Jul 12, 2018
Cloud services bring new and significant cybersecurity threats. The cloud can be secured—but not by the vendor alone. Are you clear about the risks and your responsibilities as an IT leader? Read this report to understand: • how cloud adoption is reshaping the threat landscape • why identity and access management must be a priority • what are cybersecurity best practices in a modern IT environment • which emerging technologies offer hope for improving cybersecurity outcomes. Download the report now
Tags : 
    
KPMG
Published By: Dell EMC EMEA     Published Date: Mar 13, 2020
VMwarecommissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying its VMware Workspace ONE™ Unified Endpoint Management solutionpowered by AirWatch,particularly to manage Windows 10 devices across a distributed workforce.The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Workspace ONEfor an organization’s Windows 10 modern management transformation initiativetoreduce security risks,improve desktop management processes, reduce costs, and improve employee efficiency. Workspace ONEdelivers greater mobility to employees by managing Windows 10 desktop and laptop devices using a cloud-based, modern management architecture —like the methodsadopted by IT to manage mobile phones—with anywhere access, always up-to-date operational data,all whileadhering to strict corporate security and management standards.
Tags : 
    
Dell EMC EMEA
Published By: Fortinet EMEA     Published Date: Jun 24, 2020
The evolution of modern data centers has led to applications and data being increasingly distributed across hybrid infrastructures. While this helps to enable greater agility for business-critical workflows, it simultaneously expands the organizational attack surface while obscuring visibility and inhibiting controls. Network engineering and operations leaders require integrated security with advanced capabilities designed for protecting hybrid IT data-center environments. Specifically, they need a next-generation firewall (NGFW) that includes critical risk management capabilities, scalability that extends data-center protection across all parts of the organization, resiliency for ensured business continuity, as well as automation and orchestration features to reduce the burden on staff while accelerating response times.
Tags : 
    
Fortinet EMEA
Published By: Dell EMEA     Published Date: Aug 20, 2019
Eliminate complexity and siloed IT for SAP landscapes. Industry - leading Intel based SAP HANAready compute, storage, CI/HCI, networking and data protection solutions from Dell EMC span from edge to core to cloud. Make SAP available anytime, anywhere—providing coverage for the entire business with solutions that aren’t confined to a single location. Support all your SAP workloads and enjoy world-record SAP application performance. The Dell EMC PowerEdge and broader portfolio of solutions for SAP modernizes your IT, reduces risk and simplifies IT management.
Tags : 
    
Dell EMEA
Published By: Dell EMEA     Published Date: Oct 10, 2019
Eliminate complexity and siloed IT for SAP landscapes. Industry - leading Intel based SAP HANAready compute, storage, CI/HCI, networking and data protection solutions from Dell EMC span from edge to core to cloud. Make SAP available anytime, anywhere—providing coverage for the entire business with solutions that aren’t confined to a single location. Support all your SAP workloads and enjoy world-record SAP application performance. The Dell EMC PowerEdge and broader portfolio of solutions for SAP modernizes your IT, reduces risk and simplifies IT management. Dell EMC infrastructure powered by Intel®
Tags : 
    
Dell EMEA
Published By: Salesforce     Published Date: Oct 14, 2019
Many investors were concerned over the inverted US yield curve and recessionary fears. The inversion was due to the Federal Reserve’s (Fed) excessive tightening steps in 2018 amid rising US-China trade tensions. Citi analysts believe the turn to easing by the Fed and numerous other central banks, as well as a likely more cautious approach to trade negotiations, could help to cushion risk assets. Citigold is Citi’s premium wealth management solution that is designed to meet the global banking and investment needs of affluent individuals with investable assets of USD 200,000 (or in equivalent currencies) and above. To find out more, download this whitepaper today.
Tags : 
recession, finance, investing
    
Salesforce
Published By: ForeScout EMEA     Published Date: Feb 20, 2020
The Forescout device visibility and control platform has been designated a 2019 Cyber Catalyst cybersecurity solution. The platform helps organizations reduce both business and operational risk through complete situational awareness of their extended enterprise by providing continuous, unified visibility and control of all connected devices across campus, data center, cloud, and operational technology (OT) networks. This includes critical capabilities in support of asset management, device compliance, network segmentation, network access control, and incident response initiatives.
Tags : 
    
ForeScout EMEA
Published By: Dell     Published Date: Feb 04, 2016
Older PCs are a risk due to a lack of robust hardware-based security, older processors, and outdated operating systems. This Cheat Sheet paper discusses the points you should consider when selecting notebooks and laptops for your mobile and remote workforce. Download this paper today to learn about how combining the right hardware upgrades with newer OS options and endpoint management software can provide the needed protection against today’s security risks.
Tags : 
hardware, tpm, it security, windows, telecommunication, byod
    
Dell
Published By: TriNet     Published Date: Aug 03, 2012
In this eGuide, you'll learn about ten foundational risks that small and growing companies face and how those risks can be minimized or even eliminated.
Tags : 
entrepreneurship, human resources, managing risk, compliance, risk management
    
TriNet
Published By: TriNet     Published Date: Jun 13, 2011
Learn how a PEO can help remove business risks, contain HR costs, and enable you to focus on growing your business.
Tags : 
trinet, entrepreneur, peo, professional employer organization, smb, human resources, co-employment, talent market
    
TriNet
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.